summaryrefslogtreecommitdiff
path: root/cloud/pkg/policycontroller/policycontroller.go
blob: 7844f10c6da0cacf4b1ef7d69fbc3bba1dbce2d1 (about) (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
package policycontroller

import (
	"context"
	"fmt"

	"k8s.io/apimachinery/pkg/runtime"
	utilruntime "k8s.io/apimachinery/pkg/util/runtime"
	"k8s.io/client-go/kubernetes/scheme"
	"k8s.io/client-go/rest"
	"k8s.io/klog/v2"
	controllerruntime "sigs.k8s.io/controller-runtime"
	"sigs.k8s.io/controller-runtime/pkg/manager"

	policyv1alpha1 "github.com/kubeedge/api/policy/v1alpha1"
	"github.com/kubeedge/beehive/pkg/core"
	beehiveContext "github.com/kubeedge/beehive/pkg/core/context"
	"github.com/kubeedge/kubeedge/cloud/pkg/common/messagelayer"
	"github.com/kubeedge/kubeedge/cloud/pkg/common/modules"
	pm "github.com/kubeedge/kubeedge/cloud/pkg/policycontroller/manager"
	kefeatures "github.com/kubeedge/kubeedge/pkg/features"
)

// policyController use beehive context message layer
type policyController struct {
	manager manager.Manager
	ctx     context.Context
}

var _ core.Module = (*policyController)(nil)

var accessScheme = runtime.NewScheme()

func init() {
	utilruntime.Must(scheme.AddToScheme(accessScheme))
	utilruntime.Must(policyv1alpha1.AddToScheme(accessScheme))
}

func NewAccessRoleControllerManager(ctx context.Context, kubeCfg *rest.Config) (manager.Manager, error) {
	controllerManager, err := controllerruntime.NewManager(kubeCfg, controllerruntime.Options{
		Scheme:             accessScheme,
		MetricsBindAddress: "0", // disable metrics
		// TODO: leader election
		// TODO: /healthz
	})
	if err != nil {
		return nil, fmt.Errorf("failed to create controller manager, %v", err)
	}

	if err := setupControllers(ctx, controllerManager); err != nil {
		return nil, err
	}
	return controllerManager, nil
}

func setupControllers(ctx context.Context, mgr manager.Manager) error {
	// This returned cli will directly acquire the unstructured objects from API Server which
	// have not be registered in the accessScheme.
	cli := mgr.GetClient()
	pc := &pm.Controller{
		Client:       cli,
		MessageLayer: messagelayer.PolicyControllerMessageLayer(),
	}

	klog.Info("setup policy controller")
	if err := pc.SetupWithManager(ctx, mgr); err != nil {
		return fmt.Errorf("failed to setup nodegroup controller, %v", err)
	}
	return nil
}

func Register(kubeCfg *rest.Config) {
	var pc = &policyController{}
	pc.ctx = beehiveContext.GetContext()
	mgr, err := NewAccessRoleControllerManager(pc.ctx, kubeCfg)
	if err != nil {
		klog.Fatalf("failed to create controller manager, %v", err)
	}
	pc.manager = mgr
	core.Register(pc)
}

// Name of controller
func (pc *policyController) Name() string {
	return modules.PolicyControllerModuleName
}

// Group of controller
func (pc *policyController) Group() string {
	return modules.PolicyControllerGroupName
}

// Enable indicates whether enable this module
func (pc *policyController) Enable() bool {
	return kefeatures.DefaultFeatureGate.Enabled(kefeatures.RequireAuthorization)
}

// Start controller
func (pc *policyController) Start() {
	// mgr.Start will block until the manager has stopped
	if err := pc.manager.Start(pc.ctx); err != nil {
		klog.Fatalf("failed to start controller manager, %v", err)
	}
}